# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72bf45ba46a8a9067c6602772f4e468b0529d657a9f2537bbbfc942d499f867c
Pseudo Output
44aec9b15dd46bd0bd3db235dd4027a61aa43b34601bade3701d879bc2b7cb6f
Key Image
b6f175e85b361b554371c15f16dda615c48e6e3be67345e0df242e96bda40c1d
Pseudo Output
9e3fc86db8e165db2ce8070ff863bc690bb4eb84767690382dce37347f683856
Key Image
0cfcf036bcd17573e8e2589ada24bef9a15b3770cfee7790d7ffc4400c29c056
Pseudo Output
885363b25db06ea4a70e5459c83b7c55490dfae66eb2e3367b10c177c693106c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ed72c00f2d5ddc4643bd2c7f288b35ec73b78ff9dc7cb71c12c9e3cc8790373
Commitment
a68e47d4d5b92bff98ddd27774f132775937859641864ae467b4aa1ecf26f808
Range Proof
672 bytes (Bulletproof)
Memo
841048ecb89691aaf0abc0885f12b2b0a753e921d76e22bc76b42776ab1c7192333c0bc56e56a399ca89ea5304ad6935991afc07b40c05f91b69226fe4ca5d1100a6a335b9dd8bb1e8276f8e8da392b2311ba65f5a5402d569335c26ce93f7b79602c63922e10af9469ec39285fc5495899d9193d649655ecbfaae745380ba01 (encrypted)
Stealth Address
9a6efbdc6e458f9d79ac18b063477e995ddde54372f3f455896af85b936f8e01
Commitment
8c797bcc7266c665e1deb5c0cd3a0ece026b6ca5e95db7bd71cd4ce6189c3a6d
Range Proof
672 bytes (Bulletproof)
Memo
82fe02db3d8e336b4f1f3bc9586e2d648433653baac38a45db97fa826198dd3c3481df990c7689e90fc751b20b9591369c89c008849f8b32aa3ec5473eab10066c3ce0fe91c4db8c2146129c314696c26ab8b7887e0e71816464a12386004d76fa000f6a14c223cb26ed5b67d828f6ec72a9e9149d722051ded444996e4171c8 (encrypted)